EP3840286A1 - Gesicherte dezentrale automatisierte plattform mit mehreren beteiligten zur verwaltung von objektidentitäten durch den einsatz von blockchain-technologie - Google Patents

Gesicherte dezentrale automatisierte plattform mit mehreren beteiligten zur verwaltung von objektidentitäten durch den einsatz von blockchain-technologie Download PDF

Info

Publication number
EP3840286A1
EP3840286A1 EP20214774.0A EP20214774A EP3840286A1 EP 3840286 A1 EP3840286 A1 EP 3840286A1 EP 20214774 A EP20214774 A EP 20214774A EP 3840286 A1 EP3840286 A1 EP 3840286A1
Authority
EP
European Patent Office
Prior art keywords
key
manufacturer
public
fab
util
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP20214774.0A
Other languages
English (en)
French (fr)
Inventor
Guillaume Hébert
David Leporini
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bull SAS
Original Assignee
Bull SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bull SAS filed Critical Bull SAS
Publication of EP3840286A1 publication Critical patent/EP3840286A1/de
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2379Updates performed during online database operations; commit processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • the present invention relates generally to the field of Identity and Access Management, and more particularly to automated access by objects, in a secure manner, to digital services, and the protection of the exchanges which follow.
  • the object is authorized to send on a network and to access an application service (identification and authentication of the object), which it is capable of. send encrypted, integrated and authenticated messages and that it is capable of deciphering the data received (symmetric / asymmetric cryptography).
  • IAM Identity Access Management
  • Many cybersecurity companies offer such solutions: Active Directory, IBM Security Identity and Access Assurance, Oracle Identity Cloud Service, Okta, Centrify, RSA SecurID Access, Keeper Security, SailPoint, OneLogin, Ping ... list offer centralized solutions, with internal data storage which may be of a personal nature and therefore sensitive and thus no longer comply with GDPR regulations.
  • the object is already registered and "paired with its Manufacturer / Owner".
  • the object of the present invention is therefore to propose a communication method for the secure management of keys and identities, making it possible to overcome at least part of the drawbacks of the prior art.
  • the key pair generator relies on hierarchical key wallets to provide unique manufacturing key pairs which are diversified from the Manufacturer's key pair.
  • the object is transferred from one owner to another by repeating steps d to g.
  • the method further comprises a step prior to the generation of manufacturing key pairs by the Manufacturer, in which said Manufacturer registers its Manufacturer identifier in the blockchain database and publishes their public key. Manufacturer (Kp man ) by associating it with the identifier of the Manufacturer.
  • the sharing or management of the rights on the object is operated by the owner of the object by means of verifiable credentials, preferably requested by the service providers (Service Providers) and validated by the owner. .
  • service providers Service Providers
  • a Proof system with zero knowledge disclosure in English (ZKP, Zero Knowledge Proof) is set up within a smart contract, in English Smart Contract, to provide information without revealing its values. .
  • the present invention also relates to a database, used by the secure identity management system based on a block chain, implemented on a secure, decentralized, automated and multi-actor platform for managing object identities through the use of blockchain technology implemented on several nodes of the system with which the platform communicates, the nodes being responsible for maintaining the blockchain and allowing actors (and objects) to consult the state of this chain and to interact with this chain via a shared common repository (or register), each node having access to a cryptographic module, preferably physical, in charge of the secure storage of its private key and of the 'access to the shared registry characterized in that the database constitutes a repository for each manufacturer containing a list of associated attributes (including in particular security identifiers such as cryptographic keys) and either registering them in the Manufacturer's repository, or making the update of the attributes linked to the identity of the object by the owner of an object and / or the entity in charge of its exploitation rights.
  • a database used by the secure identity management system based on a block chain, implemented on a secure, decentralized
  • Each node maintaining the blockchain must be in a secure environment, and the public identity of each node must be made available to other nodes and actors within the shared registry; the execution of Smart Contract and functions on the block chain being carried out in this secure sphere, the registration having for purpose to create a link, accessible by everyone in the chain of blocks, to make it possible to match the actor and his digital identity by a key pair, public key and private key, or by a certificate possibly signed by a certified identity management body.
  • the present invention also relates to a secure identity management system based on a block chain and capable of carrying out the steps of a communication method for the secure management of keys and identities, the system comprising at least: A Manufacturer, using a key diversification system from diversifiers generated by a generator of diversifiers, a system of connection to a chain of blocks, a system of attribution to each object produced by an identifier and a material arrangement and software to send to the blockchain server a message of publication and registration of the public key of the client Kp client and of the association in said database between the DID and the DIV.
  • Enrollment is made possible because the object is aware of its manufacturer's access point (IP address and / or gateway, etc.) and is in possession of the Kfab key pair (in particular the private key).
  • each post in the blockchain is equivalent to at least one transaction in it.
  • the DIV diversifier might not be published on the Blockchain, but for security reasons it is. Indeed this allows the Manufacturer not to store the manufacturing key pair, and thus to be obliged to recalculate it if necessary.
  • DIV is necessary since it allows the manufacturer to recalculate the key: DIV for diversifier.
  • a diversified key is obtained from a key and a diversifier: the key is known to the manufacturer and the diversifier is stored in the blockchain.
  • the object is capable of self-enrollment and signs the enrollment message with the production key (Ks fab ) that it is the only one to possess.
  • the replacement in the block chain is carried out by updating the block chain (Blockchain) via a transaction.
  • the Blockchain is like a state register: updated of the state of a value, therefore replacement via a transaction.
  • the old state is kept (blockchain paradigm) but is no longer up to date.
  • blockchain or “block chain” decentralized database is understood to mean a decentralized database comprising a network of block chains, with nodes comprising all or part of the block chain register.
  • the blockchain network uses the multiple-chain register which is replicated on all the peer nodes of the blockchain network.
  • the blockchain is a list of blocks, each containing multiple transactions. Each block has a pointer to the previous block and the order and content of the blocks are protected by hash signatures.
  • Bitcoin mining nodes build new blocks from inbound transactions. This construction is made difficult to achieve and requires considerable mining calculations, proof of work.
  • Blockchain technology is used as a shared and distributed repository of identities including a list of associated public attributes. These identities can, by way of illustration, used the DID format defined in the specification "Decentralized Identifiers (DIDs)"
  • the system is preferably not based on a public blockchain, and not on a blockchain with a proof of work, which requires computing power and energy in an IoT use case (objects with low consumption constraints and low computing power).
  • the solution is preferably based on a consortium blockchain / corporate blockchain / permission blockchain / POK blockchain (Proof of Knowledge, proof of knowledge in French).
  • a secure, decentralized, automated and multi-actor system or platform for managing object identities through the use of blockchain technology is provided.
  • a blockchain system in order to benefit from its advantages: scalability, replication, resilience to failures / attacks while adding an additional layer for IAM and GIA linked to the identity of the entities.
  • Some solutions provide for the presence of a DM (Device Manager), while in the present system, the registration is already done and the enrollment on the network is initiated by the object.
  • the autonomous object thanks to the DID.
  • the supply of the data, in particular of the identifier of the object DID, and of the public manufacturing key Kp fab , to the customer is carried out by an “off-chain” transmission.
  • an “off-chain” data supply or sending is meant a supply or sending of data by a mechanism external to the block chain, so as to improve the security and confidentiality of particularly sensitive data.
  • This is understood to mean, for example, a secure sending by e-mail, the provision on a secure storage server, the sending of a USB key with the secure data, or even other possible means conceivable by a person skilled in the art which respond to the given problem.
  • the key pair generator relies on Hierarchical Key Wallets to provide unique manufacturing key pairs that are diversified from the Manufacturer's key pair.
  • the object is transferred from one owner to another by repeating steps d through g.
  • the method further comprises a step prior to the generation of manufacturing key pairs by the Manufacturer, in which said Manufacturer registers its Manufacturer identifier in the blockchain database and publishes their public key. of Manufacturer (Kp man ) by associating it with the identifier of the Manufacturer.
  • the sharing or management of the rights on the object is operated by the owner of the object by means of verifiable credentials, preferably requested by the service providers (Service Providers) and validated by the owner.
  • service providers Service Providers
  • Verifiable Credentials and DID Documents (Decentralized Identifier), will be used respectively as a means of access control and storage format for information related to the object on the block chain. The first allows to give read access to the information of the object according to the identity of the peer.
  • a Zero Knowledge Proof (ZKP) system is set up within a smart contract, in English Smart Contract, to provide information without revealing its values.
  • ZPK is a method that allows one entity to prove to another that a proposition is true without revealing its value. This allows, for the sake of data preservation, to answer a question without revealing the value. For example, a service can ask an object if its temperature is lower or greater than 0 ° C without the object having to reveal the value of its temperature. This thus allows an optimization on the use of the service, and not in the stages.
  • Smart Contract or smart contract we mean a unique and replicated digital protocol / program that allows operations to be carried out on the blockchain, and that this is done in accordance with well-defined rules.
  • Various embodiments described also relate to a secure identity management system based on a block chain.
  • Various embodiments described also relate to a database, used by the secure identity management system based on a block chain.
  • certain embodiments relate to a database, used by the secure identity management system based on a block chain, implemented on a secure, decentralized, automated and multi-actor identity management platform.
  • objects through the use of blockchain technology implemented on several nodes of the system with which the platform communicates, the nodes being responsible for maintaining the blockchain and allowing actors (and objects) to consult the state of this chain and to interact with this chain via a shared common repository (or register), each node having access to a cryptographic module, preferably physical, in charge of the secure storage of its private key and access to the shared registry characterized in that the database constitutes a repository for each manufacturer containing a list of associated attributes, including in particular security identifiers. entity such as cryptographic keys, and either registering them in the Manufacturer's repository, or updating the attributes linked to the identity of the object by the owner of an object and / or the entity in charge of its exploitation rights.
  • Various embodiments described also relate to a secure, decentralized, automated and multi-actor platform for managing object identities using a decentralized database.
  • Each node maintaining the blockchain must be in a secure environment, and the public identity of each node must be made available to other nodes and actors within the shared registry; the execution of Smart Contract and functions on the block chain being carried out in this secure sphere, the registration having for purpose to create a link, accessible by everyone in the chain of blocks, to make it possible to match the actor and his digital identity by a key pair, public key and private key, or by a certificate possibly signed by a certified identity management body.
  • a replay attack is a form of network attack in which a transmission is maliciously repeated by an attacker who intercepted the transmission. This is a type of identity theft.
  • the system comprises at least: A Manufacturer, using a system of key diversification from diversifiers generated by a generator of diversifiers, a system of connection to a chain of blocks, a system of allocation to each object resulting from the manufacture of an identifier and a hardware and software arrangement to send to the blockchain server a message of publication and registration of the public key of the client Kp client and of the association in said database between the DID and DIV.
  • the registration also called personalization, is done only once by the manufacturer.
  • the object updates itself in the stages following manufacture, in this case in particular when it is bought / sold.
  • Enrollment is made possible because the object is aware of its manufacturer's access point (IP address and / or gateway, etc.) and is in possession of the Kfab key pair (in particular the private key).
  • the manufacturers are registered in the Blockchain, and their respective public keys are known to all. They craft and personalize Items with identifiers and crafting keys. For each object, they publish in the Blockchain the identifier, and the diversifier used to calculate the manufacturing key. Objects are able to self-enroll and change keys by generating their own keys. The key change is allowed / validated thanks to the private manufacturing key that only the object owns and uses. Service providers can verify via the Blockchain that the Object has changed key. This verification of the signature of the change could only be done by the object who was the only one who knew the production key. The figure 1 thus illustrates this by way of example and in a nonlimiting manner.
  • Step a) concerns the generation of the manufacturing key pair (Ks fab , Kp fab ) obtained via a key derivation function using a diversifier (DIV) from the Manufacturer's key pair (Ks man , Kp man ) (Step I-1), and the personalization of the object (the object is made aware of the access point of its manufacturer (IP address and / or gateway ...) and in possession of the bi- Kfab key (Step I-2)).
  • Step b) concerns the publication and registration in the blockchain of the DID and the DIV (Step II).
  • the script with a double signature makes it possible to differentiate the owner of the object from the one who created the object. This also makes it possible to check that whoever writes this transaction is indeed the one who created the object.
  • the figure 3 illustrates an exemplary non-limiting embodiment of the present invention, in which are represented steps c) and d) corresponding to the steps carried out, when a Customer purchases the object from said Manufacturer (Step III-1).
  • the proof of belonging of the object is done intrinsically because the owner is the only one to have the private key associated with the referenced public key.
  • the customer proves that he is indeed the owner of the public key by inserting his signature (Step III-2).
  • the supply of data by the Manufacturer to the customer by an “off-chain” mechanism is not represented.
  • the Manufacturer updates the common repository by publishing the public key associated with the Client Kp client and creation of the association in said database between the DID and the DIV and client Kp (Step III-3).
  • the figure 4 illustrates an exemplary non-limiting embodiment of the present invention, in which are represented steps e), f), and g) corresponding to the steps performed when the object is turned on for the first time, and self-enrolls .
  • the object once turned on, the object generates the generation of a user key pair (Step IV-1).
  • the object then self-enlists by publishing its key public use (Kp util ) in an enrollment message (Stage IV-2), the enrollment message being signed with the private production key (Ks fab ) that only the Object has.
  • the publication (Step IV-3) for updating the chain of blocks of the public use key associated with the DID of the object (and therefore replacement of the public manufacturing key associated with the DID of the object by said public use key).
  • the system thus comprises a secure identity manager based on a chain of blocks in which the identities or the process making it possible to find these identities are published.
  • the nodes of the shared register thus maintain a chain of blocks and, by extrapolation, the identity manager.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
EP20214774.0A 2019-12-16 2020-12-16 Gesicherte dezentrale automatisierte plattform mit mehreren beteiligten zur verwaltung von objektidentitäten durch den einsatz von blockchain-technologie Pending EP3840286A1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR1914486A FR3104869B1 (fr) 2019-12-16 2019-12-16 Plateforme sécurisée, décentralisée, automatisée et multi-acteurs de gestion d’identités d’objets au travers de l’utilisation d’une technologie de chaîne de blocs.

Publications (1)

Publication Number Publication Date
EP3840286A1 true EP3840286A1 (de) 2021-06-23

Family

ID=70613913

Family Applications (1)

Application Number Title Priority Date Filing Date
EP20214774.0A Pending EP3840286A1 (de) 2019-12-16 2020-12-16 Gesicherte dezentrale automatisierte plattform mit mehreren beteiligten zur verwaltung von objektidentitäten durch den einsatz von blockchain-technologie

Country Status (3)

Country Link
US (1) US11582034B2 (de)
EP (1) EP3840286A1 (de)
FR (1) FR3104869B1 (de)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210314293A1 (en) * 2020-04-02 2021-10-07 Hewlett Packard Enterprise Development Lp Method and system for using tunnel extensible authentication protocol (teap) for self-sovereign identity based authentication
CN113327165A (zh) 2021-06-07 2021-08-31 支付宝(杭州)信息技术有限公司 一种基于区块链的交易方法
CN113850607B (zh) * 2021-11-29 2022-02-11 中国信息通信研究院 基于分布式身份标识的数据跨链转移方法和系统
CN114726535B (zh) * 2022-03-30 2023-10-20 北京理工大学 一种基于区块链的隐私保护防伪汽车供应链方法
WO2024072611A1 (en) * 2022-09-26 2024-04-04 Brandon Cook Instant provenance platform

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190222424A1 (en) * 2018-01-12 2019-07-18 Nok Nok Labs, Inc. System and method for binding verifiable claims

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190349346A1 (en) * 2013-10-17 2019-11-14 Arm Ip Limited Registry apparatus, agent device, application providing apparatus and corresponding methods
US10469464B2 (en) * 2015-06-09 2019-11-05 Intel Corporation Self-configuring key management system for an internet of things network
US10749684B2 (en) * 2016-09-30 2020-08-18 Entrust, Inc. Methods and apparatus for providing blockchain participant identity binding
US10102526B1 (en) * 2017-03-31 2018-10-16 Vijay K. Madisetti Method and system for blockchain-based combined identity, ownership, integrity and custody management
US10657261B2 (en) * 2017-11-30 2020-05-19 Mocana Corporation System and method for recording device lifecycle transactions as versioned blocks in a blockchain network using a transaction connector and broker service
US10673617B1 (en) * 2018-04-24 2020-06-02 George Antoniou Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity
US11063760B2 (en) * 2018-08-22 2021-07-13 Sasken Technologies Ltd Method for ensuring security of an internet of things network
WO2020044211A1 (en) * 2018-08-30 2020-03-05 Lorenzo RICCA Method and system of distributing and tracking products and/or services
US11392702B2 (en) * 2019-03-17 2022-07-19 Microsoft Technology Licensing, Llc Discovery and matching of internet of things (IoT) devices and services using a secure global registry
US20210091960A1 (en) * 2019-09-24 2021-03-25 International Business Machines Corporation Tracking and verification of physical assets
US20210110004A1 (en) * 2019-10-15 2021-04-15 Alitheon, Inc. Rights management using digital fingerprints
US20210158372A1 (en) * 2019-11-25 2021-05-27 International Business Machines Corporation Secure management of ownership of physical objects

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190222424A1 (en) * 2018-01-12 2019-07-18 Nok Nok Labs, Inc. System and method for binding verifiable claims

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WON JONGHO ET AL: "Decentralized Public Key Infrastructure for Internet-of-Things", MILCOM 2018 - 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), IEEE, 29 October 2018 (2018-10-29), pages 907 - 913, XP033489288, DOI: 10.1109/MILCOM.2018.8599710 *

Also Published As

Publication number Publication date
US20210184845A1 (en) 2021-06-17
US11582034B2 (en) 2023-02-14
FR3104869A1 (fr) 2021-06-18
FR3104869B1 (fr) 2024-01-26

Similar Documents

Publication Publication Date Title
EP3840286A1 (de) Gesicherte dezentrale automatisierte plattform mit mehreren beteiligten zur verwaltung von objektidentitäten durch den einsatz von blockchain-technologie
Aujla et al. SecSVA: secure storage, verification, and auditing of big data in the cloud environment
KR102065315B1 (ko) 블록체인 기반 파일 보관 및 공유 시스템 및 방법
EP3840287A1 (de) Gesicherte dezentrale automatisierte plattform mit mehreren beteiligten zur verwaltung von objektidentitäten durch den einsatz von blockchain-technologie
Tootoonchian et al. Lockr: social access control for web 2.0
Fabian et al. SHARDIS: A privacy-enhanced discovery service for RFID-based product information
US20120311339A1 (en) Method for storing data on a peer-to-peer network
JP2012518330A (ja) 高信頼なクラウド・コンピューティングおよびクラウド・サービスのフレームワーク
KR20090015026A (ko) 인덱스 저장소 사용 방법, 컴퓨터 시스템, 및 컴퓨터 판독가능 매체
Gao et al. Cross-chain oracle based data migration mechanism in heterogeneous blockchains
Wilson et al. Privacy, availability and economics in the polaris mobile social network
CA3142763A1 (fr) Procede de chiffrement et de stockage de fichiers informatiques et dispositif de chiffrement et de stockage associe.
Subathra et al. [Retracted] Decentralized Consensus Blockchain and IPFS‐Based Data Aggregation for Efficient Data Storage Scheme
US20160080336A1 (en) Key Usage Detection
Gupta et al. Secure data access using blockchain technology through IoT cloud and fabric environment
Bigini et al. Decentralized health data distribution: A dlt-based architecture for data protection
FR3074592A1 (fr) Procede de partage d'une cle servant a deriver des cles de session pour crypter et authentifier des communications entre un objet et un serveur
Satish Babu et al. The Purview of Blockchain Appositeness in Computing Paradigms: A Survey.
EP2689552B1 (de) Nicht-hierarchische infrastruktur zur verwaltung von twin-sicherheitsschlüsseln von physischen personen oder von elementen (/igcp pki).
Jacobino et al. TrustVault: A privacy-first data wallet for the European Blockchain Services Infrastructure
Janiuk et al. Secure distributed data structures for peer-to-peer-based social networks
Sathana et al. Three level security system for dynamic group in cloud
Patil et al. BlockCrate: A Blockchain-Based Asset Sharing and Management Solution
Paul et al. Secure decentralised storage networks
Nandini Efficient-way of Data Storage on Decentralized Cloud using Blockchain Technology

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20211213

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20230405

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230330